Patents by Inventor Weng Sing Tang

Weng Sing Tang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9973521
    Abstract: Embodiments of the present invention disclose populating a database by conducting a training phase to analyze training security log streams. A server extracts the words contained within the training security log and replaces each of the extracted words with a symbol to form a symbol string and an n-gram scan is conducted on the symbol string to generate statistical data. Tokens are extracted from symbol string, where the tokens are words, phrase or alphanumeric sequence represented by a symbol within training security log stream. The symbol string is replaced with the words they represent to allow for the identification of the actual token phrases. A scan is conducted on the token phrase to acquire scan data on the identified token phrases. Once the tokens, position information, and scan data are known they are stored within the database to allow security log streams to be analyzed in real time.
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: May 15, 2018
    Assignee: International Business Machines Corporation
    Inventors: Tien Hiong Lee, Konstantin Levinski, Xin Qian, Harjoben Singh, Weng Sing Tang
  • Publication number: 20180129549
    Abstract: A mechanism is provided for detecting one or more defects in an incoming log. One or more features are extracted from the incoming log. Utilizing the one or more features, one or more patterns, one or more pattern sequences of the one or more patterns, and one or more proximities associated with the one or more patterns contained in the incoming log are identified. For each defect model generated for the incoming log, a set of patterns in the defect model is compared to a set of patterns in each previously identified defect model in a set of previously identified defect models. Responsive to identifying a match and responsive to set of scores associated with the match meeting or exceeding a set of probability thresholds, an identification associated with the previously identified defect model along with any solution or workaround is passed to a support engineer.
    Type: Application
    Filed: November 9, 2016
    Publication date: May 10, 2018
    Inventors: Christopher G. Fredericks, Tien Hiong Lee, Konstantin Levinski, Xin Qian, Weng Sing Tang, Xiang Zhang
  • Publication number: 20180004800
    Abstract: Embodiments of the present invention provide a means for validating electronic forms using one or more semantic databases. The invention includes processing an electronic form into individual elements and generating entities for the individual elements. The closest matching ontology is found for each entity and the pairings are grouped into a general formal ontology tree. The entities in the general formal ontology tree are traversed using generated rules. This analysis yields validation results that are combined with the original form to create an annotated form.
    Type: Application
    Filed: September 25, 2017
    Publication date: January 4, 2018
    Inventors: Ken Yian Chow, Tien Hiong Lee, Jason M. McCarthy, Weng Sing Tang
  • Publication number: 20170364402
    Abstract: A log entry identifies an error in the computer or other system. Another log entry identifies a symptom associated with the system error. The symptom occurs in timeframe prior to the system error and a variable score is determined for the symptom according to the timeframe, the consistency with which the symptom appears along with the error, and the frequency with which the symptom occurs throughout the system log. A new occurrence of the symptom is identified. Whether the symptom's variable score exceeds a threshold value for the symptom is determined. In response to determining that the symptom's variable score exceeds the threshold value, an alert indicating that the associated system error is probable is displayed.
    Type: Application
    Filed: June 21, 2016
    Publication date: December 21, 2017
    Inventors: Wei Liang Chua, Tien Hiong Lee, Konstantin Levinski, Weng Sing Tang
  • Publication number: 20170351748
    Abstract: A computer-implemented method includes receiving one or more log files. Each of the one or more log files includes one or more logs. The computer-implemented method further includes extracting one or more event records from said one or more logs. The computer-implemented method further includes, for each event record of the one or more event records, determining one or more attributes and one or more dimensions based on the event record, respectively. The computer-implemented method further includes grouping the one or more event records into one or more attribute groups. The computer-implemented method further includes ordering the one or more event records of each of the one or more attribute groups by the one or more dimensions. The computer-implemented method further includes generating one or more graphical representations of the one or more attribute groups. A corresponding computer system and computer program product are also disclosed.
    Type: Application
    Filed: August 22, 2017
    Publication date: December 7, 2017
    Inventors: Tien Hiong Lee, Konstantin Levinski, Weng Sing Tang, Liang Zhu
  • Publication number: 20170206268
    Abstract: A computer-implemented method includes receiving one or more log files. Each of the one or more log files includes one or more logs. The computer-implemented method further includes extracting one or more event records from said one or more logs. The computer-implemented method further includes, for each event record of the one or more event records, determining one or more attributes and one or more dimensions based on the event record, respectively. The computer-implemented method further includes grouping the one or more event records into one or more attribute groups. The computer-implemented method further includes ordering the one or more event records of each of the one or more attribute groups by the one or more dimensions. The computer-implemented method further includes generating one or more graphical representations of the one or more attribute groups. A corresponding computer system and computer program product are also disclosed.
    Type: Application
    Filed: January 20, 2016
    Publication date: July 20, 2017
    Inventors: Tien Hiong Lee, Konstantin Levinski, Weng Sing Tang, Liang Zhu
  • Publication number: 20170187734
    Abstract: Embodiments of the present invention disclose populating a database by conducting a training phase to analyze training security log streams. A server extracts the words contained within the training security log and replaces each of the extracted words with a symbol to form a symbol string and an n-gram scan is conducted on the symbol string to generate statistical data. Tokens are extracted from symbol string, where the tokens are words, phrase or alphanumeric sequence represented by a symbol within training security log stream. The symbol string is replaced with the words they represent to allow for the identification of the actual token phrases. A scan is conducted on the token phrase to acquire scan data on the identified token phrases. Once the tokens, position information, and scan data are known they are stored within the database to allow security log streams to be analyzed in real time.
    Type: Application
    Filed: December 28, 2015
    Publication date: June 29, 2017
    Inventors: Tien Hiong Lee, Konstantin Levinski, XIN QIAN, Harjoben Singh, Weng Sing Tang
  • Patent number: 9684707
    Abstract: A computer-implemented method includes receiving one or more log files. Each of the one or more log files includes one or more logs. The computer-implemented method further includes extracting one or more event records from said one or more logs. The computer-implemented method further includes, for each event record of the one or more event records, determining one or more attributes and one or more dimensions based on the event record, respectively. The computer-implemented method further includes grouping the one or more event records into one or more attribute groups. The computer-implemented method further includes ordering the one or more event records of each of the one or more attribute groups by the one or more dimensions. The computer-implemented method further includes generating one or more graphical representations of the one or more attribute groups. A corresponding computer system and computer program product are also disclosed.
    Type: Grant
    Filed: September 8, 2016
    Date of Patent: June 20, 2017
    Assignee: International Business Machines Corporation
    Inventors: Tien Hiong Lee, Konstantin Levinski, Weng Sing Tang, Liang Zhu
  • Publication number: 20170139975
    Abstract: Embodiments of the present invention provide a means for validating electronic forms using one or more semantic databases. The invention includes processing an electronic form into individual elements and generating entities for the individual elements. The closest matching ontology is found for each entity and the pairings are grouped into a general formal ontology tree. The entities in the general formal ontology tree are traversed using generated rules. This analysis yields validation results that are combined with the original form to create an annotated form.
    Type: Application
    Filed: November 17, 2015
    Publication date: May 18, 2017
    Inventors: Ken Yian Chow, Tien Hiong Lee, Jason M. McCarthy, Weng Sing Tang
  • Patent number: 9613162
    Abstract: Embodiments of the present invention provide a means for validating electronic forms using one or more semantic databases. The invention includes processing an electronic form into individual elements and generating entities for the individual elements. The closest matching ontology is found for each entity and the pairings are grouped into a general formal ontology tree. The entities in the general formal ontology tree are traversed using generated rules. This analysis yields validation results that are combined with the original form to create an annotated form.
    Type: Grant
    Filed: June 15, 2016
    Date of Patent: April 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Ken Yian Chow, Tien Hiong Lee, Jason M. McCarthy, Weng Sing Tang
  • Patent number: 9519698
    Abstract: A computer-implemented method includes receiving one or more log files. Each of the one or more log files includes one or more logs. The computer-implemented method further includes extracting one or more event records from said one or more logs. The computer-implemented method further includes, for each event record of the one or more event records, determining one or more attributes and one or more dimensions based on the event record, respectively. The computer-implemented method further includes grouping the one or more event records into one or more attribute groups. The computer-implemented method further includes ordering the one or more event records of each of the one or more attribute groups by the one or more dimensions. The computer-implemented method further includes generating one or more graphical representations of the one or more attribute groups. A corresponding computer system and computer program product are also disclosed.
    Type: Grant
    Filed: March 15, 2016
    Date of Patent: December 13, 2016
    Assignee: International Business Machines Corporation
    Inventors: Tien Hiong Lee, Konstantin Levinski, Weng Sing Tang, Liang Zhu
  • Publication number: 20160283854
    Abstract: The method includes identifying a log stream from a first device, wherein the first device is of an unknown device type. The method further includes identifying features in the log stream from the first device. The method further includes determining a probability that the log stream from the first device was created by a specific device type based on matching of features of the identified log stream from the first device and features in log streams from a plurality of known device types.
    Type: Application
    Filed: June 2, 2015
    Publication date: September 29, 2016
    Inventors: Tien Hiong Lee, Konstantin Levinski, Harjoben Singh, Weng Sing Tang
  • Publication number: 20160283853
    Abstract: The method includes identifying a log stream from a first device, wherein the first device is of an unknown device type. The method further includes identifying features in the log stream from the first device. The method further includes determining a probability that the log stream from the first device was created by a specific device type based on matching of features of the identified log stream from the first device and features in log streams from a plurality of known device types.
    Type: Application
    Filed: March 27, 2015
    Publication date: September 29, 2016
    Inventors: Tien Hiong Lee, Konstantin Levinski, Harjoben Singh, Weng Sing Tang
  • Patent number: 9424520
    Abstract: Embodiments of the present invention provide a means for validating electronic forms using one or more semantic databases. The invention includes processing an electronic form into individual elements and generating entities for the individual elements. The closest matching ontology is found for each entity and the pairings are grouped into a general formal ontology tree. The entities in the general formal ontology tree are traversed using generated rules. This analysis yields validation results that are combined with the original form to create an annotated form.
    Type: Grant
    Filed: March 9, 2016
    Date of Patent: August 23, 2016
    Assignee: International Business Machines Corporation
    Inventors: Ken Yian Chow, Tien Hiong Lee, Jason M. McCarthy, Weng Sing Tang
  • Publication number: 20160205085
    Abstract: According to one aspect of the present disclosure, a method and technique for dynamic adjustment of authentication mechanism is disclosed. The method includes: collecting location data of one or more agents relative to an agent attempting to authenticate to a data processing system; determining if the location data meets a threshold value; and responsive to the location data meeting the threshold value, relaxing an authentication scheme for the attempting agent to authenticate to the data processing system.
    Type: Application
    Filed: March 23, 2016
    Publication date: July 14, 2016
    Inventor: Weng Sing Tang
  • Patent number: 9313212
    Abstract: According to one aspect of the present disclosure, a method and technique for dynamic adjustment of authentication mechanism is disclosed. The method includes: collecting location data of one or more agents relative to an agent attempting to authenticate to a data processing system; determining if the location data meets a threshold value; and responsive to the location data meeting the threshold value, relaxing an authentication scheme for the attempting agent to authenticate to the data processing system.
    Type: Grant
    Filed: March 19, 2013
    Date of Patent: April 12, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Weng Sing Tang
  • Patent number: 9229671
    Abstract: A method for embedding an optical security feature in a digital document with a virtual printer and a security feature service and then sending the digital document to a hardware printer.
    Type: Grant
    Filed: March 27, 2009
    Date of Patent: January 5, 2016
    Assignee: CRIMSONLOGIC PTE LTD
    Inventors: Weng Sing Tang, Fu Wang Thio, Chee Keong Chea, Jym Yew Meng Cheong
  • Patent number: 8930413
    Abstract: Embodiments for using a dynamic structure of tables in a schema of a multi-tenant database are provided. For a tenant schema including a set of tenant tables, a label is created for a tenant table in the set of tenant tables. The label is partitioned into a set of constituent primary labels. A subset of columns is selected from the set of n columns of the tenant table, the subset of columns corresponding to a primary label in the set of constituent primary labels. The subset of columns is mapped to a table in the dynamic structure of tables in the schema of the multi-tenant database, the table in the dynamic structure of tables having the primary label. In the multi-tenant database executing in a data processing system, the dynamic structure of tables is populated with data from the tenant schema according to the mapping.
    Type: Grant
    Filed: January 3, 2012
    Date of Patent: January 6, 2015
    Assignee: International Business Machines Corporation
    Inventors: Weng Sing Tang, Liang Xu
  • Publication number: 20140289827
    Abstract: According to one aspect of the present disclosure, a method and technique for dynamic adjustment of authentication mechanism is disclosed. The method includes: collecting location data of one or more agents relative to an agent attempting to authenticate to a data processing system; determining if the location data meets a threshold value; and responsive to the location data meeting the threshold value, relaxing an authentication scheme for the attempting agent to authenticate to the data processing system.
    Type: Application
    Filed: March 19, 2013
    Publication date: September 25, 2014
    Applicant: International Business Machines Corporation
    Inventor: Weng Sing Tang
  • Publication number: 20130173669
    Abstract: Embodiments for using a dynamic structure of tables in a schema of a multi-tenant database are provided. For a tenant schema including a set of tenant tables, a label is created for a tenant table in the set of tenant tables. The label is partitioned into a set of constituent primary labels. A subset of columns is selected from the set of n columns of the tenant table, the subset of columns corresponding to a primary label in the set of constituent primary labels. The subset of columns is mapped to a table in the dynamic structure of tables in the schema of the multi-tenant database, the table in the dynamic structure of tables having the primary label. In the multi-tenant database executing in a data processing system, the dynamic structure of tables is populated with data from the tenant schema according to the mapping.
    Type: Application
    Filed: January 3, 2012
    Publication date: July 4, 2013
    Applicant: International Business Machines Corporation
    Inventors: WENG SING TANG, LIANG XU